Question 1 | Which is not supported for Web clients?
|
A1: | The correct answer is A. Web users cannot read encrypted fields. B is incorrect because Names field are supported on the Web. C is incorrect because Readers fields are supported on the Web. D is incorrect because Authors fields are supported on the Web. |
Question 2 | The Administration server specified for a database is responsible for what?
|
A2: | The correct answer is D, the Administration server's AdminP process is responsible for keeping names in the ACL and optionally in the Names fields synchronized with the Domino Directory. A is incorrect because the Compact task compacts databases. B is incorrect because the Administration process does not enforce quotas. C is incorrect because the Administration process has nothing to do with encryption. |
Question 3 | Encrypting fields on a document restricts access to what?
|
A3: | The correct answer is B. Only the fields that have been encrypted require an encryption key to access them. A and C are incorrect because field-level encryption blocks access to only certain fields. D is incorrect because you can encrypt fields. |
Question 4 | The Execution Control List (ECL) is responsible for what?
|
A4: | The correct answer is C. ECLs are used to control who can run code on a workstation and what that code can do. A is incorrect because the ECL has nothing to do with scheduling agents. B is incorrect because the ECL has nothing to do with changing the database ACL. D is incorrect because ECLs only affect execution on the Notes client. |
Question 5 | Enabling the Enforce a Consistent Access Control List property for a database does what?
|
A5: | The correct answer is E. When the Enforce a Consistent Access Control List property is enabled for a database, it ensures that all local replicas maintain a consistent ACL and that the ACL of the database is enforced locally. B is incorrect because Enforce Consistent Access Control List doesn't affect who can change the ACL. Only those with Manager access in the ACL can change the ACL. C is incorrect because Enforce Consistent Access Control List also ensures that local databases have a consistent ACL on all replica copies. D is incorrect because Enforce Consistent Access Control Lists also enforces ACLs on local databases stored on a workstation. |
Question 6 | Which of the following are valid design element security options?
|
A6: | The correct answer is D. Both Form Create List and View Access List are security options that can restrict access to design elements. A is incorrect because a Server access list restricts access to the server. B and C are incorrect because both Form Create lists and View Access lists are valid design element security options. |
Question 7 | Where is field-level encryption controlled?
|
A7: | The correct answer is D. Field level encryption options are set on the Advanced tab of the Field properties box. A is incorrect because individual fields can be encrypted. B is incorrect because field-level encryption settings are controlled on the Advanced tab of the Field properties box. C is incorrect because field-level encryption settings are controlled on the Advanced tab of the Field properties box, not the Form properties box. |
Question 8 | Extended ACLs (xACLS) can be used in which type of database?
|
A8: | The correct answer is C. Extended ACLs help delegate administration tasks in databases using the PUBNAMES.NTF template. A, B, and D are incorrect because Extended ACLs are only used with databases based on the PUBNAMES.NTF template. |
Question 9 | Roles simplify database administration and can be used where to grant or deny access in a database?
|
A9: | The correct answer is D. Roles can be used in any of the access control elements listed in this question. A is incorrect because Roles can also be used in View read lists and Readers fields. B is incorrect because Roles can also be used in Form compose lists and Readers fields. C is incorrect because Roles can also be used in Form compose lists and View read lists. |
Question 10 | Encrypted email sent to other Domino users uses which type of key?
|
A10: | The correct answer is B. Notes mail uses public key encryption. A is incorrect because Notes mail uses public key encryption. C is incorrect because User key encryption is not a valid concept in Notes. D is invalid because one-way hashing is only used in Notes to protect user's passwords. |
3.17.110.58